ct-woodpecker
A tool to monitor a certificate transparency log for operational problems (by letsencrypt)
NoCommandLine-Analytics
Private Analytics for Google Cloud Serverless (GAE, Cloud Run) (by NoCommandLine)
ct-woodpecker | NoCommandLine-Analytics | |
---|---|---|
1 | 1 | |
173 | 0 | |
3.5% | - | |
3.6 | 5.2 | |
10 months ago | 3 months ago | |
Go | ||
Mozilla Public License 2.0 | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ct-woodpecker
Posts with mentions or reviews of ct-woodpecker.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-01-28.
-
I looked through attacks in my access logs. Here's what I found
Was looking into Certificate Transparency logs recently. Are there any convenient tools/methods for querying CT logs? i.e. search for domains within a timeframe
Cloudflare’s Merkle Town[0] is useful for getting overviews, but I haven’t found an easy way to query CT logs. ct-woodpecker[1] seems promising, too
[0] https://ct.cloudflare.com/
[1] https://github.com/letsencrypt/ct-woodpecker
NoCommandLine-Analytics
Posts with mentions or reviews of NoCommandLine-Analytics.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-01-28.
-
I looked through attacks in my access logs. Here's what I found
Been doing this for Apps deployed to Google App Engine (such attacks are also common to them) and then creating firewall rules blocking those IPs.
After awhile, I decided to automate the process i.e. build an App [1] that runs on a schedule, parses the logs, identifies such traffic (spam/bots) and automatically creates the firewall rules. Since it's already parsing the logs, it also generates analytics for the Apps
1. https://github.com/NoCommandLine/NoCommandLine-Analytics